Latest in

The NY Times fumbles Bluesnarfing at the Oscars

Sponsored Links

Has the New York Times fallen prey to the hysteria over
Bluesnarfing? John Markoff and Laura M. Holson have an article today about how one of the guys from Flexilis spent
the Academy Awards hanging out front trying to Bluesnarf celeb's phones. Purely for research purposes, of course, and
the piece makes it clear that they didn't actually "tap into" anyone's phones and grab any sensitive data.

Yes, using Bluetooth to grab sensitive data from a cellphone is possible, but the article is misleading from the very
first paragraph, saying that as many as "100 people who walked the red carpet had cellphones vulnerable to the kind of
privacy invasion that recently gained Ms. Hilton a new round of unwanted notoriety." This is incorrect.
Paris Hilton's cellphone, the T-Mobile Sidekick, doesn't
have Bluetooth, and isn't vulnerable to the "same kind of privacy invasion." You can split hairs and say that they're
talking about the taking data itself, regardless of how it's accessed, as the privacy invasion, but then you might as
well talk about how Gmail or Hotmail is vulnerable to the same kind of privacy invasion if someone manages to hack into
your account.

They make it worse a little later in the piece when they write that ?50 to 100 of the attendees had smart cellphones
whose contents - like those of Ms. Hilton?s T-Mobile phone - could be electronically siphoned from their service
providers? central computers.? Again, this is incorrect. The Sidekick stores its data on a central server, but very,
very few cellphones do this. Bluesnarfing a cellphone to grab its directory or whatever would not give you access to a
service provider?s central computer.

Then even more confusingly, they don?t specify what percentage of these 50 to 100 handsets with Bluetooth that
Flexilis detected were in discoverable mode or not. This actually does make a big difference in how easy it is to grab
data off of a Bluetooth-enabled cellphone, and most handsets have discoverable mode disabled by default. Yes, it?s
messy and the particulars can be difficult to explain, but you can?t do a story about Bluetooth security without
talking about how Bluesnarfing is generally only possible under specific circumstances; discoverable mode, for starters
is one of them. And yes, while it?s possible to Bluesnarf without a phone being in discoverable mode, it?s far, far
more difficult.

So rather than address any of the actual subtleties of what?s going on or make a realistic assessment of the threat
(which exists, but by all accounts is actually pretty minimal), the Times decided to just accept at face value the
claims of a publicity-hungry security firm (remember, these companies literally have to scare up business) in order to
deliver a story about celebs and cellphone security that would somehow tie into what happened to Paris Hilton, and make
it sound like what happened to her could happen to anyone. Bluesnarfing is real, but eliding the differences between
Bluesnarfing and the hacking of Paris Hilton?s Sidekick is not just irresponsible, it?s ultimately counterproductive to
the entire discussion about cellphones, privacy, and security.

All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.